The capacity to grant access as a specific remote user is present without certs as well right? The typical authorized_keys file lives under a user directory and grants access only to that user.
The main advantage of certificates is that you are able to do that from the CA without touching the target machine.
The main advantage of certificates is that you are able to do that from the CA without touching the target machine.